CVE-2015-8738

Priority
Description
The s7comm_decode_ud_cpu_szl_subfunc function in
epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in
Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL
response, which allows remote attackers to cause a denial of service
(divide-by-zero error and application crash) via a crafted packet.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.6.3-1~ubuntu14.04.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.6.3-1~ubuntu16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (2.6.3-1~ubuntu18.04.1)
More Information

Updated: 2020-09-10 04:57:01 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)